"OMG YOU SENT TEH VIRUSESS"

Scott Silva ssilva at SGVWATER.COM
Thu Jun 16 00:57:41 IST 2005


    [ The following text is in the "ISO-8859-1" character set. ]
    [ Your display is set for the "US-ASCII" character set.  ]
    [ Some characters may be displayed incorrectly. ]

Matt Kettler said the following on 6/15/2005 4:30 PM:
> Jason Balicki wrote:
> 
>>As an update to this, I received a response today.
>>
>>Does anyone have any ammo I can use in response to
>>this:
>>
>>Begin quote:
>>As for the virus notifications, as pointless as it may seem to you, it's
>>our company policy to attempt to inform possibly infected systems
>>(whether they are forged or not) if they have sent us an infected
>>message and/or spam.  This company policy has proven effective on many
>>occasions over the past 7 years of having internet capable e-mail.  In
>>one such case we alerted a very large public safety organization of a
>>virus breakout on their network.  
>>
>>If our policy is causing grief for your mailing list, let me know which
>>software you are using to manage it, I will personally do the research
>>to show you how to properly filter out these messages.
>>
>>No-where in the RFC for SMTP mail does it cover virus notifications.  In
>>fact, the concept of silently deleting messages that could not be
>>delivered can be construed as contravening the RFC 1123.  Once an SMTP
>>system accepts the message with th 250 (OK) message in response to the
>>DATA command, it has the responsibility of delivering the message or
>>informing the sender (via return-path or from header).  If you can point
>>out a relevant RFC that prohibits these notifications, I will officially
>>turn them off.
> 
> 
> First, I would be greatly interested to hear if the public safety organization
> incident occurred within the past 2 years. It sounds quite typical of something
> which might have happened 5 years ago, but not today.
> 
> Five years ago, virus notices made sense, as nobody had yet invented the forging
> mail worm. Today, nearly all viruses and spam have forged returns.
> 
> Bear in mind that when you detect a virus in a message (modern era, not past)
> you have proved with a great deal of certainty that the return-path and from are
> forged.
> 
> Now you must ask yourself, is it within the spirit of the RFCs to generate
> failure notices directed to addresses which are known to not be the source of
> the email?
> 
> I would suggest a read of RFC 3884 for some general RFC level discussion of this
> topic. This RFC makes general recommendations for any autoresoponder, including
> virus scanners. Section 2 is highly worthwhile reading.
> 
> http://www.faqs.org/rfcs/rfc3834.html
> 
> 
> Although your behavior is not outright prohibited by this RFC, the RFC does
> suggest in section 2 that responders should avoid responding to messages which
> appear malformed, and should take measures to avoid responding to forgeries and
> other activities that allow it to be abused.
> 
> As for RFC 1123, RFC 3834 clearly condones discarding normal responses when a
> responder has good reason to believe the response will be misdirected.
> 
That's great!


-- 

/-----------------------\           |~~\_____/~~\__  |
| MailScanner; The best |___________ \N1____====== )-+
| protection on the net!|                   ~~~|/~~  |
\-----------------------/                      ()

------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the Wiki (http://wiki.mailscanner.info/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).

Support MailScanner development - buy the book off the website!




More information about the MailScanner mailing list